Shaarli export of all bookmarks on Mon, 02 Oct 17 23:28:31 -0400
- VMware support log size issue and workaround (VCSA ). | Techbrainblog
- Powercli script to validate the basic vSphere Hardening | Techbrainblog
- Ben's Law | The Cost of Being Interrupted | b3n.org
- GDPR is a set of security best practices, not a burden
- How to properly implement identity and access management
- Interesting List of Windows Processes Killed by Malicious Software - /dev/random
- [SANS ISC] The easy way to analyze huge amounts of PCAP data - /dev/random
- Rice Straw Animal Sculptures from the 2017 Wara Art Festival | Spoon & Tamago
- Google Vizier: A service for black-box optimization | the morning paper
- How to troubleshoot slow performance after moving to azure due to network latency – Azure SQL Database Support
- Roslyn Primer – Part I: Anatomy of a Compiler | The Visual Basic Team
- Appendix F - Personal observations on the reliability of the Shuttle by R. P. Feynman
- For everyone to benefit from technology, we need to ensure the free flow of information - Microsoft on the Issues
- Vermont attorney general fines company $264K for exposure of Social Security numbers
- WannaCry and NotPetya: Who, what, when and WHY?
- 63% of SMBs increased security spending, but more than half still experienced breaches - TechRepublic
- 66% of SMBs would shut down or close if they experienced a data breach - TechRepublic
- The hacker playbook: How to think and act like a cybercriminal to reduce risk (notes from Microsoft Ignite 2017) | CQURE Academy
- Are Data Center REITs a Good Investment? -- The Motley Fool
- Why auditing your documentation is a must | Opensource.com
- Aaron Toponce : 1,000 Books Read In One Year? No, Not By A Long Shot
- Google Online Security Blog: Behind the Masq: Yet more DNS, and DHCP, vulnerabilities
- [SANS ISC] Investigating Security Incidents with Passive DNS - /dev/random
- Ousted Equifax CEO Faces 3 Congressional Hearings
- Incident Response Insights from US Army Medicine CISO
- 8 Electrical Blackout Essentials Every Home Needs
- Legislature to beef up computer security – Hudson Valley 360 – InfoSecHotSpot
- Equifax breach shows signs of a possible state-sponsored hack
- The Cyberlaw Podcast: Equifax and the Upside of Nation-State Cyberattacks - Lawfare
- 7 Ways Exercising Can Help You Succeed as an Entrepreneur
- How to Use the ZFS Filesystem on Ubuntu Linux - Make Tech Easier
- Using a 40Gb to 10Gb Breakout Cable on NX-OS - Mostly NetworksMostly Networks
- HP Enterprise let Russia review the Pentagon's security software
- Equifax will warn 2.5 million additional hacking victims by mail
- PipeWire - Improved Audio & Video Handling on Linux
- Smart tattoos turn your skin into a health tracker
- GNS3 Labs for CCNA: Getting Started with GNS3 - Intense School
- CCNA-Security Study Blog » GNS3 Lab
- Our journey with devices.. what will the future bring us, what will our workplace be? -
- CCNA Training » CCNA FAQs & Tips
- Free CCNA Workbook | CCNA Labs, Practice Exams and More!
- GNS3 network simulator for CCNA - Router Freak
- .patch_storage » Peasland Database Blog
- Apple: don't use Face ID on an iPhone X if you're under 13 or have a twin | Technology | The Guardian
- Proxmox Import/Export OVA | Nbctcp's Weblog
- Upgrade ESXi 6.0 to 6.5 | Nbctcp's Weblog
- GitHub - future-architect/vuls: Vulnerability scanner for Linux/FreeBSD, agentless, written in Go
- rapid7/ metasploitable3 - a VM for metasploit. - Proturk Security Blog
- How to Configure HSRP on a Cisco Router (with GSN3 lab) - Router Freak
- CCNA Training » Practice CCNA GNS3 Labs
- GitHub - chafey/orthanc-vagrant: Vagrant VM configuration for the Orthanc DICOM server
- GitHub - chafey/dicomWeb: Information about DICOMWeb - API's, implementations, etc
- Script Modify VM Advanced Setting using PowerCli
- Data Breach Statistics by Year, Industry, More - Breach Level Index
- EPIC - Electronic Privacy Information Center
- Napalm Network Automation
- How to Buy a Used Linux Container - Crunch Tools
- ckan – The open source data portal software
- Activiti BPM Software Home
- EMR Integration for Medical Devices: The Basics (UPDATED) | Medical Connectivity
- Security/Guidelines/OpenSSH - MozillaWiki
- Hardening ssh Servers
- Privileged Access Workstations | Microsoft Docs
- OpenSSH — Harden the World 0.1 documentation
- Security & Privacy Risk Assessment | Online Trust Alliance
- Guide to better SSH-Security - Cisco Support Community
- Linux and Unix cheatsheet: Remove weak ciphers from SSH Server
- Sameh Attia: Cipher Security: How to harden TLS and SSH
- What Are Application Containers And How Do I Secure Them?
- Complexity kills marketing and sales. Keep it simple! - Proven Website Tips and Lifehacks
- ssh - OpenSSH default/preferred ciphers, hash, etc for SSH2 - Information Security Stack Exchange
- Bad SSH2 cipher spec error - comp.security.ssh
- ssh2-enum-algos
- sshscan
- Cipher Scanner for SSH download | SourceForge.net
- ScanSSH - Scanning the Internet for SSH Servers
- Hunting Pastebin with PasteHunter | Tech Anarchy
- Subnet Cheat Sheet | UITS Linux Team
- GitHub - arthepsy/ssh-audit: SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
- cmdref.net - Command Reference [cmdref.net - Command Reference]
- Testing Cumulus Linux with Serverspec - Cumulus Networks Blog
- Installing Check_MK agent on Windows host remotely | geekdudes
- DB-Engines Ranking - popularity ranking of database management systems
- The Economy: Contents
- OpenVAS
- Handy Tool for Converting KVM / VMware Images to Hyper-V | Ben Armstrong’s Virtualization Blog
- Building a Raspberry-Pi Stratum-1 NTP Server
- GitHub - dev-sec/chef-ssh-hardening: This chef cookbook provides secure ssh-client and ssh-server configurations.
- NESTED VIRTUALIZATION | virtuallyGhetto
- Nested Virtualization - Proxmox VE
- PageSpeed Examples Directory
- Nested KVM in VMware ESXi |
- Performance Cheat Sheet
- Basics of IPv6 Addressing « ipSpace.net by @ioshints
- Monitoring Using Prometheus — Rahul Sinha
- GitHub - p0bailey/packer-templates: AWS and Virtuabox packer templates for CentOS(6.8-6.9-7.3) Ubuntu(14.04-16.04) Debian(8)
- Error #1009 vSphere Web Client - David Hill
- Network Documentation Tool - IT Infrastructure Inventory Software
- A Useful PowerShell Script to Document Your Active Directory Environment
- Configuration Management with Windows PowerShell Desired State Configuration (DSC)
- Scripts for Automatic System Administration
- What should I ask a candidate for sysadmin role in the interview? : sysadmin
- Configuration Files - a pattern for windows batch scripts – tardate 2017
- A Comparison of Linux Container Images - Crunch Tools
- Container Health Index grades as used inside the Red Hat Container Catalog - Red Hat Customer Portal
- osTicket :: Support Ticket System | osTicket
- ckan – The open source data portal software
- HIPAA Privacy and Security Assessment Compliance Services Checklist
- Building a Homelab VM Server - Silly Bits
- GitHub - INSANEWORKS/centos-packer: CentOS 6 / 7 x64 + VirtualBox / VMWare for Packer Template
- The evolution of continuous experimentation in software product development | the morning paper
- Maximize productivity with a large UHD 4K display (40” or more) – Premier Developer
- Calculus in 20 Minutes | Hackaday
- Which disk controller to use for vSAN - Yellow Bricks
- PIN code is a much safer way for you to lock your Android device
- FTP Pivoting through RDP
- Vendor’s Ex-Employee Allegedly Shut Down Medicaid System
- How Health Entities Can Tap DHS Tools for Cyber Skill-Building
- Report: Equifax Subpoenaed by New York State Regulator
- Filling your data lake with log messages: the syslog-ng Hadoop (HDFS) destination - Balabit Blog
- CISOs Offer Soup-to-Nuts C-Suite Strategy
- Equihax: Identifying & Wrangling Vulnerabilities
- Here’s What to Ask the Former Equifax CEO
- Cybersecurity Insurance | Homeland Security
- Equifax mea-culpas with free credit “locks” forever – Naked Security
- Ignorance of Cyber Vulnerability Is No Excuse | CSO Online
- In Equifax Data Breach, Three Hard Lessons in Risk | CSO Online
- Practical Advice on Identity Theft and Removing Unauthorized Accounts — My Money Blog
- Identity Theft, Credit Reports, and You | Kalzumeus Software
- 3 Python web scrapers and crawlers | Opensource.com
- Announcing the dbi OpenDB Appliance - Blog dbi services
- Why going to gym multiple times a week is actually a bad thing? - Proven Website Tips and Lifehacks
- The Equifax Breach: Getting From Talk to Organized Response - Lawfare
- 7 Fun Podcasts for Kids (That Parents Love, Too)
- Packet radio lives on through open source software | Opensource.com
- You Need Configuration Management. Really. (Thwack) - MovingPackets.net
- Collect SSH Keys with Ansible « ipSpace.net by @ioshints
- WannaCry ransomware explained: What it is, how it infects, and who was responsible | CSO Online
- CBS's Showtime sites silently used Monero Miners on user's browsers
- Exploring the Air Gap Myth
- Equifax CEO retires
- Do's and Don'ts of Securing a Domain Name
- Bitdefender Ransomware Recognition Tool – Bitdefender Labs
- San Francisco sues Equifax over poor cybersecurity practices
- Breach at Sonic Drive-In May Have Impacted Millions of Credit, Debit Cards
- Fast Food Chain Sonic Drive-In Investigating Possible Card Breach
- EHR Certification Changes: Risks for Healthcare Providers
- Google Online Security Blog: Broadening HSTS to secure more of the Web
- Do CISOs Need to 'Dumb Down' Cybersecurity for Boards?
- Trojanized CCleaner Investigation: Lucky Break
- vRealize Operation 6.6 “hidden” enhancement | KISSTIBOR.info
- 10 Ways to Troubleshoot Poor VM Performance
- How to get started with Network Virtualisation and NSX
- Vanguard Thoughts: Pros and Cons from a 15-Year Client-Owner — My Money Blog
- 15 Veggie Noodle Dishes That Will Make You Forget About Pasta
- Security Tools to Check for Viruses and Malware on Linux | Linux.com | The source for Linux information
- SEC Chair Wants More Cyber Risk Disclosure From Public Firms
- Is a 15-Year Mortgage a Good Idea?
- Errata Security: 5 years with home NAS/RAID
- Will the Equifax Data Breach Finally Spur the Courts (and Lawmakers) to Recognize Data Harms? | Electronic Frontier Foundation
- FBI's Freese Shares Risk Management Tips
- How to Install Ubuntu via PXE Server Using Local DVD Sources
- Being Compliant is Not Being Secure - Your Business is Still at Risk!Webinar.
- 21 ss Command Examples In Linux
- The Importance of HTTP Strict Transport Security (HSTS) - RootUsers
- Configure Firewall Rules for Multiple Profiles Using Group Policy - RootUsers
- 8 digital skills we must teach our children | World Economic Forum
- What made Porting Microsoft SQL Server to Linux to be the right move after all – Slava Oks's WebLog
- How to reset IE11 to default configuration via a script? – We know IE!
- An Introduction to Solid State Relays | Hackaday
- Peter Block on small group working (Gurteen Knowledge)
- Building a 12V 110Ah battery bank using 80 32650 LiFePO4 cells « Dangerous Prototypes
- Kitchen Soap – Invited article in IEEE Software – Technical Debt: Challenges and Perspectives
- Welcome to the Sapiezoic – Jon Udell
- The Electronics Markets of Ho Chi Minh City, Vietnam | Hackaday
- Cuban Embassy Attacks and The Microwave Auditory Effect | Hackaday
- Cybercrime is costing each business a whopping $11.7M a year, report says - TechRepublic
- Cyber Security and Data Integrity Problems Within the GAMP 5 Validation Process
- Equifax Data Breach Prompts Calls For Tougher ...
- How I come up with topics for my blog posts - SharePoint Maven
- Gluster » Storage can make your digital transformation—or break it
- Organizations unprepared for the ransomware onslaught
- Ransomware attacks affect five percent of SMBs
- Healthcare sector accounts for most cyber security incidents
- NBlog - the NoticeBored blog: NBlog September 24 - five-step bulletproofing?
- Redboot malware leaves researchers wondering if its a ransomware or wiper
- Deloitte Breach Affected All Company Email, Admin Accounts
- Time to Embrace a Security Management Plane in the Cloud | CSO Online
- Who decides when you need to update vulnerable software? (Equifax)
- How to Install and Configure Jenkins Server on CentOS 7 to Automate Your WordPress Tasks
- How to find disk I/O latency with ioping monitoring tool on Linux – nixCraft
- Maximizing IT’s Impact with Microsoft 365 Powered Devices – Enterprise Mobility and Security Blog
- Am I a DBA 3.0 or just an SQL*DBA? - Blog dbi services
- 23 Hardening Tips to Secure your Linux Server
- Golden walk - Japan Today
- Celebrating the completion of the most advanced subsea cable across the Atlantic - The Official Microsoft Blog
- GitHub - jturgasen/my-links: A collection of OSS tools and handy links
- GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources
- AUTOMATED SECURITY HARDENING OF RED HAT ENTERPRISE LINUX V5 IN ACCORDANCE WITH DISA STANDARDS
- Security Compliance Manager (SCM)
- Top 10 Security Hardening Settings for Windows Servers and Active Directory
- NIST Cybersecurity Framework Impacting Your Company?
- Wekan — open-source kanban
- Welcome to COSO
- Updated COSO framework will help audit committees comply with SOX
- Defining a Baseline for Improvement | BPMInstitute.org
- Apache jclouds® :: Home
- COSO Framework 2013 & SOX Compliance
- SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners
- SAS 70, SSAE 16, SOC and Data Center Standards | Data Center Knowledge
- SOC 1 & SOC 2 Preparation Checklist | The SSAE 18 Reporting Standard - SOC 1 - SOC 2 - SOC 3
- The Cyborg Institute — Cyborg Institute
- HIPPA PCI-DSS Policy Mapping Table
- Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards
- Meeting Compliance Efforts with the Mother of All Control Lists (MOACL)
- Sarbanes-Oxley Information Technology Compliance Audit
- CIS Controls
- Hitask - Easy Project and Task Management for Teams
- check_mk/cisco_checkconfigsecurity at master · reca/check_mk · GitHub
- Cyberstates 2017
- 2017 IT Industry Job Market & Salary Trends Analysis | Cyberstates by CompTIA
- 17 pen testing tools the pros use | CSO Online
- HP unveils its insanely upgradeable Z-class workstations
- Exxact Corporation
- Using GPUs in KVM Virtual Machines
- Secure Deployment Guide for NetScaler MPX, VPX, and SDX Appliances
- The NeXT Years: Steve Jobs before His Triumphant Return to Apple | Low End Mac
- Cybersecurity Firms Underwhelm Despite Increased Investor Interest
- Why Equifax’s error wasn’t hiring someone with a music degree
- Learn Linux System Auditing with Auditd Tool on CentOS/RHEL
- How To Use Ping, fping, and Gping For Varies Purpose In Linux | 2daygeek: Linux Howtos, Tutorials, Guides, Linux Tips & Tricks
- How to Query Audit Logs Using 'ausearch' Tool on CentOS/RHEL
- Equifax has been sending customers to a fake phishing site for weeks – Naked Security
- OSSIM: CIS Critical Security Controls Assessment in a Windows Environment.
- Cheat sheet: How to become a cybersecurity pro - TechRepublic
- Health IT & Cybersecurity: 5 Hiring Misconceptions ...
- Equifax Data Breach: The Essential Protection Guide to Secure Your Data
- Powershell Functions for tags | Virtual Me
- 832 TB – ZFS on Linux – Configuring Storage: Part 3 | JonKensy.com
- 832 TB – ZFS on Linux – Setting Up Ubuntu: Part 2 | JonKensy.com
- 832 TB – ZFS on Linux – Project “Cheap and Deep”: Part 1 | JonKensy.com
- Calibrate Your Monitor - The Lone Sysadmin
- Linked - Tesla Remotely Extended The Range Of Drivers In Florida For Free... And That's NOT A Good Thing
- Veritas can reach APAC customers via GDPR | ZDNet
- Equifax Breach: Setting the Record Straight — Krebs on Security
- How BitPaymer ransomware covers its tracks – Naked Security
- Equifax hackers likely in network since March
- Hackers hold entire school district to ransom – Naked Security
- After massive data breach, Equifax sent victims to fake phishing site for support - TechRepublic
- Equifax breach has some calling for a credit reporting industry 'rethink'
- A look at how this small business is preparing for the GDPR
- SEC Says Intruders May Have Accessed Insider Data ...
- Equifax's May Mega-Breach Might Trace to March Hack